返回顶部
v

vmware-avi

>

作者: admin | 来源: ClawHub
源自
ClawHub
版本
V 1.4.8
安全检测
已通过
133
下载量
0
收藏
概述
安装方式
版本历史

vmware-avi

# VMware AVI AVI (NSX Advanced Load Balancer) application delivery and AKO Kubernetes operations — 29 MCP tools. > **Dual mode**: Traditional AVI Controller management + AKO K8s operations in one skill. > **Family**: [vmware-aiops](https://github.com/zw008/VMware-AIops) (VM lifecycle), [vmware-monitor](https://github.com/zw008/VMware-Monitor) (inventory/health), [vmware-storage](https://github.com/zw008/VMware-Storage) (iSCSI/vSAN), [vmware-vks](https://github.com/zw008/VMware-VKS) (Tanzu Kubernetes), [vmware-nsx](https://github.com/zw008/VMware-NSX) (NSX networking), [vmware-nsx-security](https://github.com/zw008/VMware-NSX-Security) (DFW/firewall), [vmware-aria](https://github.com/zw008/VMware-Aria) (metrics/alerts/capacity). > | [vmware-pilot](../vmware-pilot/SKILL.md) (workflow orchestration) | [vmware-policy](../vmware-policy/SKILL.md) (audit/policy) ## What This Skill Does | Category | Tools | Count | |----------|-------|:-----:| | **Virtual Service** | list, status, enable/disable | 3 | | **Pool Member** | list, enable/disable member (drain/restore traffic) | 3 | | **SSL Certificate** | list, expiry check | 2 | | **Analytics** | VS metrics overview, request error logs | 2 | | **Service Engine** | list, health check | 2 | | **AKO Pod Ops** | status, logs, restart, version info | 4 | | **AKO Config** | values.yaml view, Helm diff, Helm upgrade | 3 | | **Ingress Diagnostics** | annotation validation, VS mapping, error diagnosis, fix recommendation | 4 | | **Sync Diagnostics** | K8s-Controller comparison, inconsistency list, force resync | 3 | | **Multi-cluster** | cluster list, cross-cluster AKO overview, AMKO status | 3 | ## Quick Install ```bash uv tool install vmware-avi vmware-avi doctor # checks Controller connectivity + kubeconfig + avisdk ``` ## When to Use This Skill - List, enable, or disable virtual services on AVI Controller - Add, remove, drain, or restore pool members (maintenance windows, rolling deployments) - Check SSL certificate expiry across all virtual services - View VS analytics — throughput, latency, error rates, request logs - Check service engine health and resource usage - Troubleshoot AKO pods — status, logs, restarts - Manage AKO Helm configuration — view, diff, upgrade values.yaml - Validate Ingress annotations and diagnose why a VS wasn't created as expected - Detect sync drift between K8s resources and AVI Controller objects - Get a cross-cluster view of AKO deployments and AMKO status **Use companion skills for**: - VM lifecycle, deployment, guest ops → `vmware-aiops` - NSX segments, gateways, NAT → `vmware-nsx` - DFW firewall rules, security groups → `vmware-nsx-security` - K8s cluster lifecycle (Supervisor, TKC) → `vmware-vks` - Read-only vSphere monitoring → `vmware-monitor` ## Related Skills — Skill Routing | User Intent | Recommended Skill | |-------------|------------------| | Load balancer, VS, pool, AVI, ALB, AKO | **vmware-avi** ← this skill | | VM lifecycle, deployment, guest ops | **vmware-aiops** (`uv tool install vmware-aiops`) | | Read-only vSphere monitoring | **vmware-monitor** (`uv tool install vmware-monitor`) | | Storage: iSCSI, vSAN, datastores | **vmware-storage** (`uv tool install vmware-storage`) | | NSX networking: segments, gateways, NAT | **vmware-nsx** (`uv tool install vmware-nsx-mgmt`) | | NSX security: DFW rules, security groups | **vmware-nsx-security** (`uv tool install vmware-nsx-security`) | | Tanzu Kubernetes (Supervisor/TKC) | **vmware-vks** (`uv tool install vmware-vks`) | | Aria Ops: metrics, alerts, capacity | **vmware-aria** (`uv tool install vmware-aria`) | | Multi-step workflows with approval | **vmware-pilot** | | Audit log query | **vmware-policy** (`vmware-audit` CLI) | ## Common Workflows ### Maintenance Window — Drain a Pool Member When taking a backend server offline for patching, you need to drain traffic gracefully before maintenance and restore it after: 1. List pool members and health → `vmware-avi pool members my-pool` 2. Disable the target server (graceful drain) → `vmware-avi pool disable my-pool &lt;server-ip&gt;` 3. Wait for active connections to drain (monitor analytics) → `vmware-avi analytics my-vs` 4. Perform maintenance on the server 5. Re-enable the server → `vmware-avi pool enable my-pool &lt;server-ip&gt;` 6. Verify health status is green → `vmware-avi pool members my-pool` ### AKO Ingress Not Creating VS When a developer reports their Ingress isn't producing a Virtual Service, the typical debugging path is: 1. Check AKO is running → `vmware-avi ako status` 2. Validate Ingress annotations → `vmware-avi ako ingress check <namespace>` 3. Check sync status → `vmware-avi ako sync status` 4. If annotations are wrong → `vmware-avi ako ingress diagnose <ingress-name>` (shows what's wrong and suggests fix) 5. If sync is drifted → review diff `vmware-avi ako sync diff` and force resync if needed ### SSL Certificate Expiry Audit Expired certificates cause outages. Run periodic checks across all controllers: 1. Check all certificates → `vmware-avi ssl expiry --days 30` 2. Review which VS uses each expiring cert → output includes VS mapping 3. Plan renewal with the certificate team ## Usage Mode | Scenario | Recommended | Why | |----------|:-----------:|-----| | Local/small models (Ollama, Qwen) | **CLI** | ~2K tokens vs ~8K for MCP | | Cloud models (Claude, GPT-4o) | Either | MCP gives structured JSON I/O | | Automated pipelines | **MCP** | Type-safe parameters, structured output | | AKO troubleshooting | **CLI** | Interactive log tailing, Helm diff output | ## MCP Tools (29) | Category | Tools | |----------|-------| | Virtual Service (3) | `vs_list`, `vs_status`, `vs_toggle` | | Pool Member (3) | `pool_members`, `pool_member_enable`, `pool_member_disable` | | SSL Certificate (2) | `ssl_list`, `ssl_expiry_check` | | Analytics (2) | `vs_analytics`, `vs_error_logs` | | Service Engine (2) | `se_list`, `se_health` | | AKO Pod (4) | `ako_status`, `ako_logs`, `ako_restart`, `ako_version` | | AKO Config (3) | `ako_config_show`, `ako_config_diff`, `ako_config_upgrade` | | Ingress Diagnostics (4) | `ako_ingress_check`, `ako_ingress_map`, `ako_ingress_diagnose`, `ako_ingress_fix_suggest` | | Sync Diagnostics (3) | `ako_sync_status`, `ako_sync_diff`, `ako_sync_force` | | Multi-cluster (3) | `ako_clusters`, `ako_cluster_overview`, `ako_amko_status` | ## CLI Quick Reference ```bash # === Traditional Mode (AVI Controller) === vmware-avi vs list [--controller <name>] vmware-avi vs status <vs-name> vmware-avi vs enable <vs-name> vmware-avi vs disable <vs-name> # double-confirm vmware-avi pool members <pool-name> vmware-avi pool enable <pool> <server-ip> vmware-avi pool disable <pool> <server-ip> # double-confirm (graceful drain) vmware-avi ssl list vmware-avi ssl expiry [--days 30] vmware-avi analytics <vs-name> vmware-avi logs <vs-name> [--since 1h] vmware-avi se list vmware-avi se health # === AKO Mode (K8s) === vmware-avi ako status [--context <k8s-context>] vmware-avi ako logs [--tail 100] [--since 30m] vmware-avi ako restart # double-confirm vmware-avi ako config show vmware-avi ako config diff vmware-avi ako config upgrade # double-confirm + --dry-run default vmware-avi ako ingress check <namespace> vmware-avi ako ingress map vmware-avi ako ingress diagnose <ingress-name> vmware-avi ako sync status vmware-avi ako sync diff vmware-avi ako sync force # double-confirm vmware-avi ako clusters vmware-avi ako amko status ``` > Full CLI reference: see `references/cli-reference.md` ## Troubleshooting ### "Controller unreachable" error 1. Run `vmware-avi doctor` to verify connectivity 2. Check if the controller address and port are correct in `~/.vmware-avi/config.yaml` 3. For self-signed certs: set `verify_ssl: false` in config.yaml (lab environments only) ### AKO Pod in CrashLoopBackOff 1. Check logs → `vmware-avi ako logs --tail 50` 2. Common causes: wrong controller IP in values.yaml, network policy blocking AKO→Controller, expired credentials 3. Fix config → `vmware-avi ako config show` to inspect, then Helm upgrade with corrected values ### Ingress created but no VS on Controller 1. Validate annotations → `vmware-avi ako ingress check <namespace>` 2. Check AKO logs for rejection reason → `vmware-avi ako logs --since 5m` 3. Run sync diff → `vmware-avi ako sync diff` to see if the object is stuck ### Pool member shows "down" after enable Health monitor may still be failing. Check the actual health status on the Controller side — the member is enabled but unhealthy. Fix the backend service first, then the health status will auto-recover. ### SSL expiry check shows 0 certificates Verify the controller connection has tenant-level access. Certificates are tenant-scoped in AVI — the configured user may only see certs in their tenant. ### AKO sync force has no effect Force resync triggers AKO to re-reconcile all K8s objects. If the drift persists, the issue is likely in the K8s resource definition itself (bad annotation, missing secret). Use `vmware-avi ako ingress diagnose` to pinpoint the root cause. ## Setup ```bash uv tool install vmware-avi mkdir -p ~/.vmware-avi vmware-avi init # generates config.yaml and .env templates chmod 600 ~/.vmware-avi/.env vmware-avi doctor # verify Controller + K8s connectivity ``` > All tools are automatically audited via vmware-policy. Audit logs: `vmware-audit log --last 20` > Full setup guide, security details, and AI platform compatibility: see `references/setup-guide.md` ## Audit & Safety All operations are automatically audited via vmware-policy (`@vmware_tool` decorator): - Every tool call logged to `~/.vmware/audit.db` (SQLite, framework-agnostic) - Policy rules enforced via `~/.vmware/rules.yaml` (deny rules, maintenance windows, risk levels) - Destructive operations (`vs_toggle` disable, `pool_member_disable`, `ako_restart`, `ako_config_upgrade`, `ako_sync_force`) require double confirmation - `ako_config_upgrade` defaults to `--dry-run` mode — user must explicitly confirm to apply - View recent operations: `vmware-audit log --last 20` ## License MIT — [github.com/zw008/VMware-AVI](https://github.com/zw008/VMware-AVI)

标签

skill ai

通过对话安装

该技能支持在以下平台通过对话安装:

OpenClaw WorkBuddy QClaw Kimi Claude

方式一:安装 SkillHub 和技能

帮我安装 SkillHub 和 vmware-avi-1775884681 技能

方式二:设置 SkillHub 为优先技能安装源

设置 SkillHub 为我的优先技能安装源,然后帮我安装 vmware-avi-1775884681 技能

通过命令行安装

skillhub install vmware-avi-1775884681

下载 Zip 包

⬇ 下载 vmware-avi v1.4.8

文件大小: 12.92 KB | 发布时间: 2026-4-12 11:52

v1.4.8 最新 2026-4-12 11:52
Security patch: bump cryptography 46.0.6→46.0.7 (CVE-2026-39892), urllib3→2.6.3, requests→2.33.0

Archiver·手机版·闲社网·闲社论坛·羊毛社区· 多链控股集团有限公司 · 苏ICP备2025199260号-1

Powered by Discuz! X5.0   © 2024-2025 闲社网·线报更新论坛·羊毛分享社区·http://xianshe.com

p2p_official_large
返回顶部